Trust management in WSN - case study evaluation - Publication - Bridge of Knowledge

Search

Trust management in WSN - case study evaluation

Cite as

Full text

download paper
downloaded 27 times
Publication version
Accepted or Published Version
License
Copyright (ICT Young 2012)

Keywords

Details

Category:
Conference activity
Type:
publikacja w wydawnictwie zbiorowym recenzowanym (także w materiałach konferencyjnych)
Title of issue:
ICT Young 2012: II konferencja Studentów i Doktorantów Elektroniki, Telekomunikacji, Informatyki, Automatyki i Robotyki : materiały konferencyjne, Gdańsk, 26-27.05.2012 strony 581 - 586
Publication year:
2012
Bibliographic description:
Górski J., Turower A.: Trust management in WSN - case study evaluation// ICT Young 2012: II konferencja Studentów i Doktorantów Elektroniki, Telekomunikacji, Informatyki, Automatyki i Robotyki : materiały konferencyjne, Gdańsk, 26-27.05.2012/ ed. Wydział Elektroniki, Telekomunikacji i Informatyki, PG. Gdańsk: ICT Yung, 2012, s.581-586
Bibliography: test
  1. Górski J., Turower A., Wardziński A.: Distributed Trust Management Model for Wireless Sensor Networks, Sixth International Conference on Dependability and Computer Systems DepCoS- RELCOMEX, 2011
  2. Górski J., Turower A.: Two-tier distributed trust management model for wireless sensor networks, Forum Innowacji Młodych Badaczy, 2011 open in new tab
  3. van Solingen R., Berghout E.: The Goal/Question/Metric method: A practical guide for quality improvement of software development, McGraw-Hill Publishing Company, England, 1999 open in new tab
  4. Zia T. A.: Reputation-based Trust Management in Wireless Sensor Networks, International Conference on Multimedia and Ubiquitous Engineering, 2007, pp. 603-607
  5. Momani M., Challa S.: Trust Management in Wireless Sensor Networks, proc. of 5th ACM Conference on Embedded Networked Sensor Systems, 2007 open in new tab
  6. Maroti M. et al.: The Flooding Time Synchronization Protocol, proc. of 2nd ACM Conference on Embedded Networked Sensor Systems, 2004 open in new tab
  7. Loscri V. et al.: A Two-Levels Hierarchy for Low-Energy Adaptive Clustering Hierarchy (TL- LEACH), Vehicular Technology Conference, 2005, pp. 1809-1813 open in new tab
  8. Heinzelman W.R. et al.: Energy-Efficient Communication Protocol for Wireless Microsensor Networks, Proc. of the Hawaii International Conference on System Sciences, 2000 open in new tab
  9. Handy M.J. et al.: Low Energy Adaptive Clustering Hierarchy with Deterministic Cluster-Head Selection, 4th International Workshop on Mobile and Wireless Communications Network, 2002, pp. 368-372 open in new tab
  10. Description of Final ANGEL Demonstrator w ANGEL Project Report; open in new tab
  11. Deliverable D5.2, ANGEL Project, 2007 open in new tab
  12. ZigBee Alliance: ZigBee Home Automation Public Application Profile specification, 2007 open in new tab
  13. Gołaszewski G., Górski J.: Context sensitive privacy management in a distributed environment, Lecture Notes in Computer Science, 2010, LNCS 6426, Springer, pp. 639-655 open in new tab
  14. IEEE: Standard 802.15.4 open in new tab
Verified by:
Gdańsk University of Technology

seen 93 times

Recommended for you

Meta Tags